Identity management for the TUB Cloud
Abstract
Our students and researchers arrive nowadays at the university with a broad knowledge and expectations about the IT support and the IT technology. Notebooks, netbooks, smart phones together with a broad WiFi coverage enable a nearly unlimited freedom regarding information acquisition, selection, and processing regardless of the current working environment and the time of the day. A broad selection of available applications for smart phones removes even the necessity to be in a specific area in order to approach and use the services. Schools, colleges, and universities must adapt to the expectations of these digital natives and offer their services in a similar way. They must see the user as a customer in the middle of all processes and allow a maximum possible increase of efficiency in order to fulfill the complex requirements in study and research.
However, university such as TU Berlin is not comparable to a commercial provider of certain services, e.g. with a provider of flight tickets. The university unifies manifold services such as study, research, management, projects, patents, cooperation and many more. It also hosts different groups of users having different contexts and needs for services. The integrated service provision is to recognize the current user context, to identify the need, and to provide reliable access to the selected services regardless of the current working environment. In this paper, the path of the TU Berlin towards integrated service provision is described.
Keywords: |
Cloud Computing; Identity Management
|
Full Text: |
References
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman (1996). ROLEBASED
ACCESS CONTROL MODELS. Computer, Volume 29(2):38–47.
T. Hildmann and J. Bartholdt (1999). MANAGING TRUST BETWEEN COLLABORATING COMPANIES USING OUTSOURCED ROLE BASED ACCESS CONTROL. In Proceedings of the Fourth ACM RBAC Workshop. http://dx.doi.org/10.1145/319171.319181
T. Gebhardt and T. Hildmann (2000). ENABLING TECHNOLOGIES FOR ROLE BASED ONLINE DECISION ENGINES. In Fifth ACM Workshop on Role-Based Access Control. http://dx.doi.org/10.1145/344287.344305
Aneta Poniszewska-Maranda (2005). ROLE ENGINEERING OF INFORMATION SYSTEM USING EXTENDED RBAC MODEL. In WETICE’05, IEEE.
David F. Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandramouli (2007). ROLE-BASED ACCESS
CONTROL, Second Edition, Chapter 4.6, Artec House.
T. Hildmann and C. Ritter (2007). TUBIS-INTEGRATION VON CAMPUSDIENSTEN AN DER TECHNISCHEN UNIVERSITÄT BERLIN. PIK-Praxis der Informationsverarbeitung und Kommunikation, 30(3):145–151.
P. Berndt, M. Hovestadt, and O. Kao (2012). ARCHITECTURE FOR REAKIZING CLOUD-BASED IT INFRASTRUCTURES. In Proceedings of the 3rd Intl. Conference on Next Generation Information Technology (ICNIT), ICNIT 2012, pages 204–210. IEEE publishers.
DOI: 10.7250/eunis.2013.004
Refbacks
- There are currently no refbacks.
EUNIS 2013
ISBN 978-9934-10-433-6 - online